WhatsApp Adds File Sharing – Another Reason for CIO to Look for Mobile-friendly Secure Enterprise File Sharing

Posted by Sayali Kekre on March 4 2016

Facebook-owned WhatsApp messaging service (one of the most popular consumer applications) has introduced file sharing (currently only PDF). For consumers this is a moment to cheer. But given that corporate employees are increasingly using WhatsApp for communication, the addition of document sharing is another data leakage channel that every CIO needs to pay attention to.

Read More

Topics: Mobile Content Management (MCM), Compliance, file security, enterprise file sharing, Secure FIle Sharing, enterprise digital rights management, Shadow-IT, Access Control, encryption, data governance, Mobile File Sharing, data leakage

How to Solve Shadow-IT for File Sharing Without Compromising Compliance and Governance Objectives

Posted by Anand Kekre on November 3 2015

Shadow IT is becoming a serious risk for businesses and a pervasive problem for IT leaders resulting in not only huge cost endurances for the company but also in serious threats of security, data leakage and (most importantly) compliance risks. The shadow IT in enterprises has significantly increased over last few years because of proliferation of freely available cloud services (like Dropbox) and mobile applications.

If you ever discover Shadow-IT in your organization, the best way to handle it is not by giving a knee-jerk reaction and banning it outright, but understanding the end-user needs and provide them an alternative.

Read More

Topics: Mobile Content Management (MCM), Compliance, File Sharing, BYOD, Enterprise File Sync & Share, FTP Replacement, Dropbox Alternative, endpoint data protection, Secure FIle Sharing, enterprise digital rights management, Shadow-IT, VPN-free access, Outlook Plugin, IBM lotus notes, data governance, data leakage

Lotus Notes now integrated with Digital Rights Management for Compliance and Data Governance

Posted by Anand Kekre on October 16 2015

In line with our vision of delivering end-to-end file security, we are today announcing the addition of Vaultize Lotus Notes Plug-in to our enterprise file sync & share (EFSS) platform. This enables large size file sharing capability through Lotus Notes with complete security, IT control and visibility to meet compliance and data governance requirements.

The Vaultize Plug-in for IBM Lotus Notes replaces email attachments with secure links – enabling better IT control while reducing email storage (both in the mailbox and on email server) and network bandwidth.

Read More

Topics: Digital Rights Management (DRM), Compliance, Announcements, file security, Enterprise File Sync & Share, Dropbox Alternative, enterprise digital rights management, Shadow-IT, Data Loss Prevention, Online Document Viewer, Access Control, IBM lotus notes, data governance, Cloud-in-a-box

Large Attachment Problem – Resorting to Consumer File Sharing Can Be eDiscovery and Compliance Risk

Posted by Gary Cooke on October 8 2015

Data size is growing day by day. Large attachments have been a problem for corporate users and enterprise IT both. IT restricts the size of attachments to control the growth of (costly) storage and to keep the Exchange/Domino servers efficient. Bloated mailboxes affect the efficiency of mail clients like Outlook and Lotus Notes.

Read More

Topics: Compliance, enterprise file sharing, Enterprise File Sync & Share, Dropbox Alternative, Shadow-IT, Dropbox Replacement, Enterprise Dropbox, eDiscovery, Outlook Plugin, data governance

Do You Have Substantial Evidence of Data Breaches Through File Sharing?

Posted by Gary Cooke on September 29 2015

With the explosive growth of freely available consumer file sharing services like Dropbox many companies are finding out the hard way that their employees have been sharing valuable, and often times confidential company information, with external individuals with little or no security measures in place.  Being able to identify what information was shared and to whom it was shared may prove difficult in times of legal or internal investigations when Shadow-IT exists.

Even those companies who have implemented an enterprise file sharing (Enterprise File Sync & Share – EFSS) as Dropbox alternative may find that their ability to audit and report on what information was shared with whom and when may find that these capabilities are severely lacking in their current product.

Read More

Topics: Compliance, File Sharing, enterprise file sharing, Enterprise File Sync & Share, Dropbox Alternative, endpoint data protection, Secure FIle Sharing, Shadow-IT, data retention, data governance

You've Got Mail from Dropbox - Shadow-IT is Official Now

Posted by Anand Kekre on September 22 2015

Ignorance is Bliss! So far you may have turned a blind eye to the fact that your employees are using Dropbox to store and share corporate documents.

Now - You’ve got email from Dropbox suggesting you to become a paying customer by subscribing to their Business version as a number of your employees are using Free Consumer version with their official email ids.

Read More

Topics: Mobile Content Management (MCM), Thought Leadership, file security, enterprise file sharing, Enterprise File Sync & Share, Dropbox Alternative, enterprise digital rights management, Shadow-IT, Dropbox Replacement, Enterprise Dropbox

Mitigating Shadow-IT Security Risks Using Vaultize

Posted by Sayali Kekre on August 27 2015

The world of corporate IT has seen a definite shift toward better focus on network security, vulnerability management and data governance. Even as enterprise IT succeeds in deploying better security controls for the assets they know about, it is facing a growing threat from within — the challenge of shadow IT. The escalation of shadow IT in enterprises has remarkably increased over last few years because of freely available consumer cloud services (like Dropbox) and mobile applications.

Read More

Topics: Digital Rights Management (DRM), BYOD, data leakage prevenation, enterprise file security, Dropbox Alternative, Shadow-IT, Data Loss Prevention

4 Business Risks Associated with Shadow IT You Should Know

Posted by Sayali Kekre on August 20 2015

Shadow IT is the use of any application or IT resource obtained or built by business users without the knowledge or approval of their IT department. It is becoming a pervasive problem resulting in not only the huge cost endurances for the company but also serious threats of data leakage, security and compliance risks. The proliferation of shadow IT in enterprises has significantly increased over last few years because of freely available cloud services (like Dropbox) and mobile applications.

Read More

Topics: Digital Rights Management (DRM), Compliance, Enterprise Mobility Management, enterprise file security, Shadow-IT

Free White Paper: 6 Essentials For 100% Secure Enterprise File Sharing

Subscribe To The Blog By Email

Blog Topics